Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is the SSL Not Available Risk?

So you've received a critical risk finding for SSL not available, which means your domain does not have an SSL certificate installed on the server. To resolve this finding, you can generate and supply an up-to-date SSL/TLS certificate on your site. SSL, which stands for secure sockets layer, and its successor TLS, or transport layer security, are internet protocols for securing traffic between systems with an encryption algorithm.

Leveraging Komodo Consulting's Cybersecurity Services to Comply with the NIS 2 Directive

As the digital landscape evolves, so too does the regulatory environment. One of the latest pieces of legislation to impact organizations across the EU is the Network and Information Security 2 (NIS 2) Directive. This directive, aimed at enhancing cybersecurity across the Union, has far-reaching implications for a wide range of organizations, both within and outside the EU.
Featured Post

Helping Customers Optimise and Secure Digital Transformation

Rewind a couple of years and enterprises were heavily focused on acquiring new tech to drive forward their digitisation plans. Then, when the pandemic struck, organisations were forced to fix any technology gaps in their environment and digitise services to hastily plug these gaps. Cybercriminals - aware of the opportunity that the new remote landscape offered - were also taking advantage, quickly exploiting vulnerabilities across the digital ecosystem to infiltrate and breach organisations.

Kubernetes Security Compliance Frameworks

The challenge of administering security and maintaining compliance in a Kubernetes ecosystem is typically the same: an increasingly dynamic, ever-changing, ephemeral landscape. Changes can be rooted in new approaches to cyberattacks or changing regulations. Kubernetes security requires a complex and multifaceted approach since an effective strategy needs to.

Effective Access and Collaboration on Large Lab Datasets using Egnyte's Smart Cache

The life sciences industry is at the forefront of data-intensive research and innovation. Scientists and researchers rely heavily on the collection, processing, and analysis of vast amounts of data generated by lab instruments. And they are often challenged by errors or confusion in managing data flows that in turn, have a direct impact on the quality of data and corresponding compliance with regulatory requirements.

A Long-Running Credential Phishing Expedition

Researchers at Akamai describe a credential phishing campaign that’s been running since at least March 2022. Due to the volume of traffic to the phishing sites, the researchers estimate that the attackers are raking in up to $150,000 per year by selling the stolen credentials. “This ongoing research led to the discovery of multiple templated sites used as front-ends for the scam infrastructure that have been tied to more than 40,000 malicious routing domains,” the researchers write.

What Is Cybercrime: The Different Types You Need to Look Out For

The question “What is cybercrime?” is more critical today than ever. Advancements in tech, oversharing on social media, and even the latest AI innovations have significantly increased the risk of cyberattacks. Just look at the statistics. Ransomware attacks grew by 92.7% in 2021 compared to 2020. As internet connectivity and usage grow globally, cybercriminals are becoming more brazen in targeting unsuspecting victims.

What is Lambda Code Signing?

By enabling code signing, you can guarantee that only trusted code is executed within your functions. Lambda meticulously examines each code package during deployment and verifies that a reliable source has signed it. Please note that code signing is not supported for functions defined as container images. This means that code signing cannot be utilized if you use container images for your Lambda functions.

Top 15 Data Security Posture Management (DSPM) platforms for 2023

Data Security Posture Management (DSPM) plays a critical role in identifying security risks, prioritizing misconfigurations, and implementing a zero-trust framework. It is an emerging technology, and there are only a few capable solutions that provide good product offerings. Check out the list of some of the best DSPM platforms that can be considered to streamline data protection, governance, and compliance efforts.

WannaCry Ransomware Attack: What, Who, Why, When, & How to Stay Protected?

The May 12, 2017, WannaCry ransomware attack was one of the most devastating and globally widespread computer infections. The next WannaCry is prepared and about to occur in 2023, claims Kaspersky. The potential reason is that the biggest and most devastating cyber epidemics happen every six to seven years. Here are some helpful tips to stay protected against WannaCry ransomware.